logo
Clozapine May Up Infection Risk in Schizophrenia

Clozapine May Up Infection Risk in Schizophrenia

Medscape2 days ago
TOPLINE:
Clozapine use was associated with a 25% higher risk for infections in patients with schizophrenia than the use of olanzapine, with a 45% higher risk in those aged 55 years or older, a large cohort study showed.
METHODOLOGY:
The population-based cohort study included electronic health record data from the Hong Kong Hospital Authority for more than 11,051 adults with schizophrenia.
Participants had used clozapine (n = 1450; mean age, 41 years; 52% women) or olanzapine (n = 9601; mean age, 45 years; 55% women) continuously for 90 or more days and had previously used at least two other antipsychotic medications, representing a cohort with treatment resistance.
The primary outcome was occurrence of any infectious disease, with subtypes analyzed as secondary outcomes.
Medication was initiated from 2004 to 2023, with 2002-2003 as a wash-out period. Mean follow-up periods for clozapine and olanzapine users were about 6.9 years and 5 years, respectively.
TAKEAWAY:
Overall, 3551 cases of infections were observed during the study. Clozapine use was associated with a significantly greater risk for infection than olanzapine use (weighted hazard ratio [HR], 1.25; P < .0001).
Risk for infection from use of clozapine vs olanzapine increased with age: 18-44 years (weighted HR, 1.24; P = .002), 44-54 years (weighted HR, 1.41; P = .001), and 55 years or older (weighted HR, 1.45; P = .002).
Risk for upper and lower respiratory tract infections was also significantly higher with use of clozapine vs olanzapine (weighted HRs, 1.50 and 1.71, respectively; P < .0001 for both) as was the risk for gastrointestinal infections (weighted HR, 1.90; P = .0001).
Although men and women both had significantly greater infection risk with use of clozapine vs olanzapine, the rate was greater in men (weighted HRs, 1.32 and 1.18, respectively).
IN PRACTICE:
The investigators noted that although there have been calls to relax current requirements for regular hematological monitoring when using clozapine, their findings 'underscore the importance of regular follow-up to identify early and manage infections, which possibly arise because of a weakened immune system.'
Authors of an accompanying editorial noted that patients receiving higher doses might be at even greater risk for adverse events.
'An intermediate balance of personalized dosing designed to limit clozapine-induced inflammation and regular blood testing and physical monitoring…could offer a safe and less invasive compromise to maximize the number of patients receiving clozapine treatment,' the editorial authors wrote.
SOURCE:
The study was led by Yuqi Hu, the University of Hong Kong, Hong Kong. The editorial was led by Scott R. Clark, University of Adelaide, Adelaide, Australia. Both were published online on July 28 in The Lancet Psychiatry.
LIMITATIONS:
The study was limited by its observational design, which may have introduced selection bias, and by the absence of key covariates, including socioeconomic status and lifestyle factors. It also lacked laboratory data on drug levels and immune function and only captured infections requiring secondary or tertiary care. Additional constraints included unmeasured anticholinergic effects, a predominantly Chinese cohort that limited generalizability, and not including patients with lived experience.
DISCLOSURES:
The study was partially supported by the Laboratory of Data Discovery for Health funded by AIR@InnoHK. Some of the study investigators and editorialists reported having financial, advisory, or employment ties with various sources, including pharmaceutical companies. Full details are provided in the original articles.
This article was created using several editorial tools, including AI, as part of the process. Human editors reviewed this content before publication.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

20 Hidden Cybersecurity Weaknesses In The Healthcare Industry
20 Hidden Cybersecurity Weaknesses In The Healthcare Industry

Forbes

time3 hours ago

  • Forbes

20 Hidden Cybersecurity Weaknesses In The Healthcare Industry

Few industries face a digital environment as complex and high-stakes as healthcare, where a single breach can endanger both patients and providers. While HIPAA compliance and patient privacy dominate most cybersecurity discussions, many other critical threats remain overlooked—hidden in workflows, medical devices and third-party partnerships. These gaps can be exploited quietly, sometimes for months, before they're detected. Below, members of Forbes Technology Council reveal the most underreported cybersecurity challenges in healthcare. They explain why addressing these risks is essential to safeguarding patient care, maintaining compliance and preserving trust in the healthcare system. 1. Aging, Interconnected Devices And Software The biggest weakness is the interoperability between vastly disparate medical devices and software and the stacks and ages between them. The industry relies on connected tech ranging from cutting edge to 20 years old. This forces advanced systems to communicate with less secure ones, inevitably negotiating security down to the lowest common denominator and leaving the ecosystem vulnerable at its weakest link. - Gunter Ollmann, Cobalt 2. Vendors' Email Systems We invest heavily in internal security, but the real risk often sits in a vendor's inbox. Email is still the top attack vector, and third-party partners with weak defenses put us all at risk. It's time we hold our ecosystem to higher standards—asking tough questions about authentication, phishing readiness and account takeover protection. - Eyal Benishti, IRONSCALES Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify? 3. Third-Party Software And Devices Many hospitals and health systems rely on dozens (sometimes hundreds) of third-party tools: electronic health record plug-ins, diagnostic systems, billing platforms and Internet-of-Things-connected medical devices. These vendors often require access to sensitive patient data or internal networks; however, they may not be held to the same security and compliance standards as the healthcare organization itself. - Jonathan Stewart, ZenSource 4. Phishing Attacks One overlooked challenge is the sheer volume of phishing attacks targeting healthcare organizations. Hackers target valuable patient data and exploit outdated systems, vast supply chains and limited security training to dupe employees into clicking links or interacting with business email compromise attacks. This can lead to ransomware, and healthcare firms are more likely to pay to keep critical services running. - Mike Britton, Abnormal AI 5. Outdated Legacy Systems Outdated legacy systems are a major overlooked weakness. Long depreciation cycles mean critical connected medical devices and software often can't be updated, forcing reliance on vulnerable old policies. This widespread issue creates significant network attack surfaces. Better control, visibility and microsegmentation are vital to restrict access and mitigate damage until patching is possible. - Erez Tadmor, Tufin 6. Lack Of Frontline Cybersecurity Training Frontline staff often lack adequate cybersecurity training, making them susceptible to social engineering attacks. For instance, a smooth-talking patient might distract a clinician, who then forgets to lock their workstation before leaving the room. This could expose sensitive data, including personally identifiable information and other patients' health records, which poses serious risks to privacy and healthcare system security. - Sunny Banerjee, First Citizens Bank 7. Missing Data Lineage In AI-Driven Systems In today's AI-driven healthcare offerings, one big gap no one talks about is data lineage. We obsess over encryption and access controls but rarely ask, 'Where did the data come from, how was it changed, and who touched it?' Without clear tracking, silent corruption and model poisoning slip through, quietly eroding diagnostic accuracy, AI performance and patient trust over time. - Kiran Elengickal, Siemba 8. On-Premises Servers One overlooked cybersecurity risk in healthcare is the reliance on on-premises servers. Many practices still store sensitive patient data locally, without regular updates, backups or monitoring. This creates serious vulnerabilities. Cloud-based platforms with well-managed open APIs provide centralized security and safer, scalable integrations. - Eric Giesecke, Planet DDS 9. Manual Certificate Management One overlooked challenge in healthcare cybersecurity is manual certificate management. Expired or misconfigured digital certificates can take down EHR systems, delay care and put patient safety at risk. Automated certificate lifecycle management is critical to maintaining secure, uninterrupted operations. - Jason Sabin, DigiCert Inc. 10. Data Silos And BMAs One overlooked weakness or challenge is data silos and business-managed applications. BMAs fly under the radar when it comes to security guidelines and are always at risk of exposure. BMAs also tend to be at risk of compliance failures at various levels. The risk is higher with financial analytics or operational analytics, which involve highly sensitive and critical data. - Sanath Chilakala, NTT Data 11. Outdated Medical Devices One significant cybersecurity risk in healthcare is outdated medical devices. Many work with expensive legacy software and struggle each cycle to patch it, making them easy pickings for internet bad actors. With limited encryption and little chance of being swapped out, they continue to be plugged into sensitive networks, endangering patients and the integrity of client records. - Sreekanth Narayan, LTIMindtree 12. Shadow IT And BYOD Practices Shadow IT and bring-your-own-device practices in healthcare, such as staff using personal devices or apps for convenience, expand the attack surface beyond what most systems monitor. These informal workflows bypass standard protections, leaving patient data and core systems exposed without anyone noticing. - Mark Mahle, NetActuate, Inc. 13. Insecure Data Sharing During Clinical Trials An overlooked cybersecurity risk in healthcare is insecure data sharing during clinical trials. With multiple stakeholders and fragmented oversight, sensitive patient data often flows across systems without unified governance. The sector must adopt secure-by-design interoperability frameworks that protect trust as much as innovation. - Rishi Kumar, MatchingFit 14. Unsecured Data Exhaust From Medical IoT Devices A critical but under-discussed vulnerability in healthcare is the data exhaust from medical IoT devices like infusion pumps and smart monitors. These devices stream telemetry constantly, often unsecured, creating a quiet but massive attack surface. Deploying edge-based zero-trust agents directly on these devices could validate every outbound data packet in real time. - Nicola Sfondrini, PWC 15. Legacy Devices With Hardcoded Credentials Legacy medical devices with hardcoded credentials or outdated firmware are a massive blind spot. They often sit on flat networks and are invisible to IT teams. During EHR breaches, a compromised infusion pump or MRI interface could quietly offer persistent access, turning patient care tools into attack surfaces. Cybersecurity must evolve to treat these devices like endpoints, not exceptions. - Raghu Para, Ford Motor Company 16. Continued Use Of Fax Machines The real threat in healthcare cybersecurity? Fax machines. Hospitals still send patient data through outdated, insecure systems because 'that's how it's done.' It's not hackers we should fear most; it's complacency. Security won't come from patching the past. It'll come from rethinking it entirely. - Oleg Sadikov, DeviQA 17. Lack Of Standardized Secure Communication Protocols Shared secure communication between different companies is a risk. While the healthcare industry has a standard for HIPAA compliance, there is no standard for communication. Some data is still exchanged in physical form. The weakness occurs when data moves from one system to another and is left unencrypted. The best solution is to establish a communication standard that uses changing keys and algorithms. - WaiJe Coler, InfoTracer 18. Weak Endpoint Security For Mobile Devices One significant but frequently overlooked challenge in healthcare cybersecurity is the lack of robust endpoint security for mobile devices used by healthcare professionals. These devices often access sensitive patient data remotely, yet many organizations fail to implement adequate security measures such as encryption and remote wipe capabilities. This increases exposure to data breaches. - Roman Vinogradov, Improvado 19. Unsecured DevOps Pipelines One risk that's often ignored is unsecured DevOps pipelines in healthcare tech stacks. Rapid CI/CD deployment cycles (without quality control and cyber reviews) can bypass critical security gates, introducing unvetted code into patient data environments. Secure DevSecOps integration shouldn't be optional; it's a vital aspect of developing secure code and essential to protecting data integrity and maintaining clinical trust. - Dan Sorensen 20. Lack Of Comprehensive DSPM Practices When you combine the healthcare industry's irregular cloud adoption tendencies, disparate network of legacy devices and lack of consistent cybersecurity training, you create the perfect opportunity for malware and ransomware attacks. By integrating comprehensive data security posture management, teams can continue to grow their digital capabilities without sacrificing patient privacy. - Thyaga Vasudevan, Skyhigh Security

Tencent pops, Chinese tech stocks, UnitedHealth approves dividend
Tencent pops, Chinese tech stocks, UnitedHealth approves dividend

Yahoo

time3 hours ago

  • Yahoo

Tencent pops, Chinese tech stocks, UnitedHealth approves dividend

Tencent (TCEHY) stock is climbing after the company reported a 15% jump in quarterly revenue. Chinese tech stocks, including Alibaba (BABA), Baidu (BIDU), and (JD), are rising on Tencent's results, US rate cut optimism, and reports of Chinese scrutiny on Nvidia (NVDA) chips. UnitedHealth (UNH) stock gains after the company's board approved a $2.21 per share quarterly dividend. Stay up to date on the latest market action, minute-by-minute, with Yahoo Finance's Market Minute. It's time for your Yahoo Finance market minute. Stocks are rallying, flirting with fresh all-time highs as investors raise their expectations for a rate cut at the September meeting to nearly 100%. Chinese tech giant Tencent reporting a 15% jump in revenue driven by massive demand for newly released games. The company also boosting its capex spending in the second quarter, investing in AI upgrades for its for its advertising, gaming and social media businesses. We're seeing other Chinese tech stocks also getting a boost. Alibaba and Baidu both in the green. Tencent's rise, China's reported scrutiny of Nvidia's AI chips, as well as US rate cut optimism, all adding to gains in that sector. And United Health Group's board authorizing a quarterly dividend of $2.21 per share to be issued September 23rd. That news is sending shares higher. The stock's been under pressure this year as United Health faces rising costs, policy headwinds and operational concerns. And that's your Yahoo Finance market minute. Scan the QR code below to track the best and worst performing stocks of the session. Related Videos CoreWeave earnings don't answer the big question bears are asking Starbucks turnaround check-in: 1 yr. since CEO shake-up AMD, KinderCare, 180 Life Sciences: Trending Tickers D-Wave CEO talks quantum computing's capabilities & what's next Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store